US12255894B2 - Method and system for running an identity and access management system - Google Patents
Method and system for running an identity and access management system Download PDFInfo
- Publication number
- US12255894B2 US12255894B2 US17/774,523 US202017774523A US12255894B2 US 12255894 B2 US12255894 B2 US 12255894B2 US 202017774523 A US202017774523 A US 202017774523A US 12255894 B2 US12255894 B2 US 12255894B2
- Authority
- US
- United States
- Prior art keywords
- functionality
- computer
- code
- slave computer
- master computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/3017—Runtime instruction translation, e.g. macros
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Definitions
- the invention relates to a method and an associated system for executing an identity and access management system.
- at least one layer is provided for structuring information and/or data.
- a master computer communicates with at least one slave computer.
- the method comprises a mobile terminal with a network interface.
- a spatially limited network segment is provided, which provides a network-technical solution.
- the network solution ensures that the localisation of the mobile terminal takes place.
- the network segment is also identified.
- a user server is arranged that controls access to digital data and ensures compliance with specific rights.
- time-to-market factor is a decisive success factor. This refers to the time span with which new products and/or services can be introduced into a market from the development stage.
- digital platforms offer the opportunity to test new business models and implement them in the market.
- the interfaces between the product and/or service introduced into the market and the respective user represent a new area of conflict. Here it must be clarified who the respective user is. It must be possible to reliably confirm the identity of the user. Furthermore, it must be determined how a consistent experience of the provider with the new product and/or the new service can be determined across all associated device interfaces.
- IAM Identity and Access Management
- IAM Identity and Access Management
- An identity and access management system provides a framework that includes strategies and technologies to ensure that the right person, preferably in a company, possesses the necessary access rights.
- the identity and access management system relates preferably, but not exclusively, to dealing with customers.
- the term “Customer Identity and Access Management (CIAM)” is commonly used.
- identity and access management system can also be applied to other contexts, such as employees, B 2 B partners, alumni or applicants.
- customer identity and access management will be used in the same way as the term “customer identity and access management system”.
- Customer Identity and Access Management maps the identity of the customer in all its facets securely and reliably. With the help of customer identity and access management, the identity of the customer can be reliably checked and protected.
- Securing the identity of the customer is in the foreground.
- a password can be assigned.
- a two-factor authentication system can be used.
- biometric characteristics of the customer can be queried with different technical procedures.
- a digital profile of the customer is created and/or an existing digital profile is refined.
- the digital profile of a customer may include master data. These are preferably, but not exclusively, the customer's address, date of birth and contact details.
- the master data recorded in the customer's digital profile may further comprise preferences and/or interests and/or legal position concerning property of the customer.
- the customer's digital profile can be used to increase security. For example, if a customer is based in Germany and registers from a distant country, the system can, among other things, request additional characteristics of the user in order to prove his identity and prevent misuse.
- the digital profile of the customer makes it possible to get to know the customer better.
- the needs of the respective customer can be better assessed.
- the creation of a digital profile requires the customer's consent to the collection and/or further processing of their data.
- the data and/or information of the customer's digital profile can be used for so-called email marketing and/or to perform customer data analysis.
- the customer identity and access management enables the customer to present his identity to preferably a computer software and/or a computer platform by means of a password.
- the customer can preferably log in to a web shop.
- his password With the help of his password, he can move independently in a data-secured, personalised area, preferably a platform.
- the customer can preferably, but not exclusively, use a “single sign-on” to gain uniform and convenient access to a broad-based offer system.
- single sign-on access the user obtains access to all computers and/or services, e.g. at his or her workplace, for which he or she is preferably locally authorised (authorization), by means of a one-time identification and/or a one-time authentication.
- the user can access all other computers and/or services from his workstation without having to have himself/herself identified and authorised every time.
- the only prerequisite is that the user is authorised to access the predefined computers and/or predefined services.
- a respective renewed identification and authentication is no longer required for access to the predetermined computers and for the predetermined services.
- the identity and access management can further comprise a consistent data integration by means of a CRM system.
- the invention understands a customer relationship management system under CRM system.
- a provider directs his company specifically and consistently towards the customer.
- Customer relationship management includes the documentation and administration of his relationships with customers. With the help of customer relationship management, the relationships between the provider of goods and/or services and the customers can be deepened and aligned in the long term.
- Customer relationship management enables the supplier to have a preferably but not exclusively 360 degree view of his customer.
- the points of contact can be, for example, a website or a smartphone app.
- the points of contact between the provider and the customer can also be ensured by a service advisor of the provider. Furthermore, the points of contact with the customer can be established via a local dealer and/or a telephone hotline.
- Customer identity and access management enables the provider to streamline and/or improve its offer portfolio.
- Offers to the customer can be delivered in a targeted and timely manner.
- Data and/or information on the customer's behaviour can be collected and/or structured and/or stored.
- data and/or information for the formation of the customer profile can be summarised and/or evaluated from various sources.
- the provider of goods and/or services can create a platform, preferably in the memory of his computer, which he and/or the customer can access.
- the provider can create an interface to applications of other providers of goods and services.
- Open API describes a scheme for the uniform specification and description of a programme interface, also called Application Programming Interface (API), so that other systems and developers can easily understand, use and integrate it.
- API Application Programming Interface
- Customer Identity and Access Management covers various functions in this way. It is a central success factor, preferably, but not exclusively, for digital business processes.
- the provider must be able to offer the goods and/or services to national and international customers in the same way and under the same conditions.
- the products and/or services must be reliably available to customers at national and international level.
- the cost structure for the offer of goods and/or services must be presented to the customer in a transparent and calculable way.
- the invention understands “cloud services” to mean preferably an “IT infrastructure” which is preferably made available via the Internet. Within the “cloud service”, additional storage space and/or supplementary computing power is made available to the user.
- the user can also receive application software as a service.
- Identify-as-a-Service IdaaS
- AuthO AuthO
- OKTA AuthO or OKTA
- the invention understands the term “Identity-as-a-Service” (IDaaS) to mean preferably, but not comprehensively, an authentication infrastructure.
- the authentication infrastructure is preferably set up, operated and managed by a service provider.
- the Identity-as-a-Service service is preferably a single sign-on service for cloud services.
- the installation of a software program product for an identity and access management system is often very time-consuming and therefore cost-intensive.
- the associated software product comprises a large number of components that have to be installed.
- the installation preferably within the framework of a cluster operation, is very time-consuming, even if it always follows the same scheme.
- the automations are therefore comparatively expensive to implement and cannot be transferred to other users.
- SaaS solutions So-called software-as-a-service solutions (SaaS solutions) are not applicable as possible alternatives for many users.
- clients Several users are set up as so-called “clients” on a single system.
- the user has no influence on the strategy and/or the project plan (roadmap) for the installation of the identity and access management system.
- the user has no influence on the time at which changes are made to the identity and access management system.
- Known identity and access management systems and/or associated software products comprise a large number of standard tasks that are—due to the system—installed by every user.
- An adaptation of the identity and access management system and/or the associated software programme product to the specific needs of the user and/or to operational characteristics cannot be carried out, or only to a limited extent.
- the invention therefore has the object of providing a method and an associated system for executing an identity and access management system which eliminates the above-mentioned shortcomings of known systems.
- the problems are solved by a method for executing an identity and access management system according to the features of claim 1 .
- the tasks are further solved by the features of a system for executing the method according to claim 25 .
- the master computer comprises at least one component.
- the component is designed as a computing device and/or as a memory unit respectively.
- the component is further designed as at least one working component.
- one unit of a functionality of the computing device and/or of the memory device respectively is generated.
- one unit of the functionality of the further working component of the master computer is generated respectively.
- the respective units of functionality of the computing device and/or the memory device and/or the functionality of the further working component are converted into at least one code.
- the units of the respective functionalities are transmitted in coded form from the master computer to the slave computer.
- the master computer is controlled by means of the computing device.
- Each unit of functionality of the software program product is converted into at least one code respectively.
- the respective unit of functionality of the software program product is transmitted in coded form from the master computer to the slave computer.
- the computing device and/or the memory device and/or the further work component and/or the software program product of the master computer are configured depending upon at least one parameter of the at least one slave computer.
- the respective configuration is converted into a code.
- the configuration is thus transmitted in coded form from the master computer to the slave computer.
- a memory device of the slave computer In a memory device of the slave computer, data and/or information of a user is stored.
- a personal profile of the user is created in the computing device of the slave computer for the identification and/or authentication of the user and/or authorization of the user.
- the units of functionality of the computing device and/or the memory device converted into code are transferred into the computing device and/or the memory device and/or into the further working component as well as into at least one runtime environment (Kubernetes) of the slave computer.
- Kelnetes runtime environment
- the code-converted units of the respective functionalities of the further working component and the code-converted units of the software program product and/or the configuration of the master computer are transferred to the computing device and/or to the memory device and/or to the further working component as well as to at least one runtime environment (Kubernetes) of the slave computer.
- the user's data and/or information is processed and/or edited in the computing device and/or in the memory device and/or in the further working component of the slave computer.
- the editing and/or processing takes place there by means of the transferred functionalities of the software program product to the slave computer.
- the code-converted units of the respective functionalities transferred from the master computer to the slave computer act on the computing device and/or on the memory device and/or on the further working component and/or on the software program product of the slave computer.
- the code can be a platform code.
- the invention means preferably, but is exclusively, systems such as “Amazon”, “AWS”, “Microsoft Azure” or “Google Cloud Platform”.
- configuration as code means the separation of the configuration to the specific need and/or specific requirement of a user from a product.
- product the invention preferably, but not exclusively, means a software program product.
- the product is preferably, but not exclusively, a software program product.
- the configuration is stored separately from the product as code and allows to react dynamically to the runtime environment. If, for example, the runtime environment is accessible under a certain Uniform Resource Locator (URL) (for example, HGciam.de), this URL can be configured automatically so that the system can be addressed there.
- URL Uniform Resource Locator
- the URL is therefore not statically configured, but is dynamically configured at runtime.
- the system is able to adapt dynamically depending on how many users are currently using the system or, for example, which hardware versions are available in the runtime environment.
- the invention provides that the installation of the identity and access management system and/or the installation of the associated software program product is fully automated.
- the user is provided with the necessary infrastructure for the installation of the identity and access management system and/or the associated software program product in a cloud.
- the configuration of the identity and access management system and the associated software program product is carried out by transferring a code from the master computer to the slave computer.
- the cloud environment explained above can be provided either by the user himself or by an external party.
- the former allows for further advantages in terms of security and governance. Since the user is a direct contractual partner of the cloud provider, he has all direct access options himself and can also assert, for example, audit rights. This represents a clear advantage over a complex contractual construct via subcontractors.
- Automatic backups and/or monitoring functions are transferred to the user in coded form on his slave computer.
- Kevrones is understood by the invention to mean a “runtime environment” or an “execution environment”.
- runtime environment is a software program with which preferably software program products can be made executable within the framework of the identity and access management system, preferably in an unfamiliar environment.
- the runtime environment preferably connects user software programs with the operating system pre-installed in the respective computer.
- the central aspect of Kubernetes is that it is designed for the execution of application programs in highly available environments. It thus represents a runtime environment for distributed, redundant systems across several computers.
- the identity and access management system can be designed as a microservice-based architecture.
- the identity and access management system and/or the software programme product can be subdivided into individual microservices.
- the identity and access management system and/or the software programme product can be extended and/or expanded independently of other components of the identity and access management system or the software programme product.
- Configurations can be transferred in coded form from the master computer to any slave computer.
- the time-to-market is reduced to a minimum of the time originally required.
- Geographical and/or legal adaptations can be set up with the help of at least one code and transferred from the master computer to the slave computer.
- the storage facility of the master computer can be a data processing centre or a local cloud.
- the master computers may each have host sites at locally different locations.
- Host locations can be exemplary and in no way exclusively, located in any country and/or continent in the world.
- the “hosting” according to the invention ensures short server latencies with simultaneous availability of support and service 24 hours a day, 7 days a week.
- Identity and Access Management Systems and/or associated software programme products can be divided into different versions depending on the needs and/or requirements of the user. Regardless of any market- and/or user-specific adaptations, the basic version of the identity and access management system and/or the associated software programme product remains the same.
- the basis for each new version is an already tried and tested version of the identity and access management system and/or the associated software program product.
- the data and/or information is imported into a duplicated system in the master computer.
- the tested and error-free data and/or information is preferably transferred in coded form from the master computer to the user's slave computer.
- the systems of the master computer can be identical to the system of the slave computer.
- a planned production system of the user including all necessary processes, can be tested in detail via the master computer.
- Valuable user data remains on the slave computer and cannot be damaged.
- the tested and approved systems and software programme products can be transferred from the master computer to the slave computer.
- the relationship between the master computer and the slave computer describes a hierarchical management of access to common resources, data or information.
- the resources comprise the units of functionality of the respective components of the master computer.
- the master computer comprises as components at least one computing device and/or at least one memory device.
- An additional component of the master computer is the further working component.
- the further working component can be any hardware unit of the master computer which is required for the execution of a computer program product.
- the master computer communicates with at least one slave computer.
- the master computer is designed to generate functional units of its computing device and/or functional units of its memory device and/or functional units of another working component.
- the master computer generates preferably by means of its computing device units of functionality of the software program product.
- the respective unit of functionality of the software program product of the master computer is converted into a code.
- the units of functionality are transferred in coded form from the master computer to the slave computer.
- the master computer includes a memory device.
- the memory device is designed as a data memory or as a storage medium and is used to store data and/or information.
- the memory device of the master computer can be an electronic component. It can also be a data carrier or a storage medium.
- the memory device may be a cloud where data and/or information is stored via the Internet.
- the invention preferably understands the term “computing device” to mean an electronic switching device for executing instructions of a software program product.
- the computer's computing device has building blocks for programming, with which any processing logic for data can be represented.
- the computing device of the master computer is an arithmetic logic unit (ALU).
- ALU arithmetic logic unit
- a code is a specification in which each character of a first character set is uniquely assigned a character and/or character string from another character set.
- the code serves to exchange data and/or information between the master computer and the slave computer.
- the code serves to transfer units of functionality of the computing device and/or the memory device and/or the further working component of the master computer to the slave computer.
- the code serves to transfer the unit of functionality of the software program product from the master computer to the slave computer.
- the respective unit of functionality is converted into at least one code.
- the respective unit of functionality is thus transmitted in coded form from the master computer to the slave computer.
- the master computer and/or the slave computer comprise at least one information-formulating entity (recorder/transmitter).
- the master computer and/or the slave computer additionally comprise at least one information-receiving entity.
- the information-receiving entity is designed as a reading device or as a receiver.
- the coded unit of the respective functionality is transmitted as information in coded form between the master computer and/or the slave computer.
- the transmission of units of the respective functionality takes place from the master computer to the slave computer.
- the transmission of data and/or information, preferably in the form of units of a respective functionality may also be transmitted from the slave computer to the master computer.
- At least two codes can be stored in at least one code memory device (code repository).
- the invention means a device of the computing device and/or the memory device of the master computer, in which each version of the identity and access management system and/or each version of the software program product is managed.
- all versions of the units of functionality preferably of the computing device and/or the memory device and/or the further working component, are converted into the respective code, bundled and stored.
- the code is continuously provided by the master computer.
- the code is continuously integrated into the slave computer.
- the code is provided and/or integrated into the slave computer with the aid of a predefined automation infrastructure (CI/CD).
- CI/CD predefined automation infrastructure
- the code that is transferred from the master computer to the slave computer is preferably a text file and in particular follows a predefined semantic.
- the automation infrastructure applies dynamic changes during the transfer from the master computer to the slave computer based on existing runtime conditions. What these are is specified by the “configuration-as-code”.
- the “configuration-as-code” can be carried out for example, but not exclusively, with the help of the Go-Templating-Language. This is a language for the semantic description of logical dependencies for the modification of arbitrary outputs. It is implemented in the Go programming language.
- the unit of the respective functionality and/or the unit of the configuration are adapted and/or adjusted before or during or after the transmission from the master computer to the slave computer.
- the unit of the respective functionality and/or configuration is scaled before or during or after the transmission from the master computer to the slave computer.
- scaling the invention understands a subdivision and/or an evaluation of the units of the functionalities or the configuration according to a certain ranking, preferably according to physical quantities.
- the units of functionality and/or configuration may be scaled before or during or after transmission according to predetermined numerical values and/or units of measurement.
- the preceding list is only exemplary and in no way intended to be exhaustive.
- the capacity of the computing device and/or the capacity of the memory device and/or the capacity of the further working component is expanded and/or changed.
- the capacity and/or areas and/or steps of the software program product are expanded and/or changed.
- the enumeration is only exemplary and in no way meant to be exhaustive.
- the units of functionality and/or configuration transferred from the master computer to the slave computer are each designed as a service.
- the service is provided by the master computer for the slave computer.
- a “single sign-on process” can also be executed by the software system introduced into the runtime environment.
- At least two runtime environments are configured in clusters of runtime environments (Kubernetes clusters).
- At least two runtime environments can each be structured in at least two layers that differ from one another.
- the at least one unit of functionality of the software program product and/or the configuration are structured according to an internal dependency and/or according to an external dependency in at least two layers.
- the structuring of the unit of functionality of the software program product and/or the configuration may be structured according to an external dependency and/or according to an integration logic and/or according to a basic configuration separately in at least two layers.
- the at least one unit of functionality of the computing device and/or the at least one unit of functionality of the memory device and/or the at least one unit of functionality of the working component and/or the at least one unit of functionality of the software program product may be structured according to at least one internal reference in at least two layers.
- the structuring in at least two layers may also be structured separately in layers according to a given user configuration and/or according to a deployment abstraction (the part of the configuration that relates to an environment has to be abstracted).
- the at least one unit of functionality of the computing device and/or the at least one unit of functionality of the memory device and/or the at least one unit of functionality of the working component may be structured in at least two layers depending on at least one infrastructure configuration and/or depending on at least one cluster service configuration and/or depending on a user service configuration.
- the at least one unit of functionality of the software program product can be structured in at least two layers depending on at least one infrastructure configuration and/or depending on at least one cluster service configuration and/or depending on at least one user service configuration.
- the structuring enables a layered architecture according to hierarchical levels that differ from one another.
- the respective layers can be connected to each other by assigning references and/or can be integrated into each other.
- a layer can, if necessary, override another layer.
- Each layer can preferably comprise at least two so-called “sub-layers”.
- a first layer is assumed (denoted: component), which refers to the software programme product of the master computer.
- a second layer (denoted: user service) comprises the configuration of the hardware components of the slave computer and/or the configuration of the software programme product according to the requirements and particularities of the user.
- the third layer (designated: user stage) preferably concerns the units of functionality of the hardware components, which are transmitted from the master computer to the slave computer as respective units of functionality in coded form.
- the layers of the layer architecture form the basis for the structuring of the respective codes.
- the code storage facilities code repository
- the artefacts files used by the automation infrastructure for further processing
- They are, for example, precompiled software code, containers and other files) can be structured.
- the respective layers form the automation infrastructure within the process for executing the identity and access management system, as well as the associated software programme product.
- the layers of the layered architecture serve to realise and/or ensure continuous installation and continuous integration of the units of functionality and/or configuration that are communicated and transferred from the master computer to the slave computer.
- specific user environments can preferably be transferred and installed from the master computer to the slave computer in coded form.
- the data and/or information defined in the respective layer architecture can be used across at least two users.
- the tested changes are transferred from the master computer in coded form to the slave computer, where they are implemented and configured to the respective requirements and needs of the user.
- a layered architecture of the slave computer can be reproduced in the master computer.
- the layered architecture of the slave computer replicated in the master computer enables the installation and/or testing of any special features and/or requirements necessary for the user's slave computer.
- the replication of the user's slave computer in the master computer includes the complete environment of the slave computer with all the necessary environments under the control of the layers of the layered architecture.
- the data or information of the hardware components of the master computer and the associated software programme product are configured within the master computer to the requirements and needs of the user.
- the units of functionality configured for the user are then communicated and transferred from the master computer to the slave computer.
- the configuration files comprising the user's configuration data and/or information are transferred in codes and transmitted in the form of the codes across all layers from the master computer to the slave computer using, for example, but not limited to, a go-templating language.
- the configuration files to be transferred from the master computer to the slave computer can comprise and/or map at least one logic. In this way, it is possible to react flexibly and dynamically to user dependencies or parameters by means of the configuration.
- the invention understands the term “internal dependency” to mean a reference of the respective first layer, preferably to any hardware component, in order to thus make the layer dependent on the respective hardware component.
- external dependency expresses a dependency of the respective layer preferably to external software libraries.
- software library is preferably, but not exclusively, understood to mean an “open source”. It can also mean “docker images” or “helm charts”.
- the internal and/or external dependencies are copied into the infra-structure of the layered architecture.
- the internal and/or external dependencies are checked for so-called vulnerabilities (preferably CVEs) or for licence compatibility.
- integration logic describes that a logic is preferably implemented in the respective layer in order to integrate the respective component with preferably at least one cluster service.
- integration logic furthermore includes automated monitoring of availability and/or monitoring of metrics. Additionally, integration into a centralised log management is also included. Additionally, the term may also mean an implementation of required logics for installation, preferably of software program products.
- the invention understands the configuration of so-called use cases, with the help of which projects can be started with less time expenditure.
- the so-called basic configuration can preferably be combined with other hardware components or with software components or integrated into other components. However, a dependency between the basic configuration and the respective component is not required.
- the configuration is transferred from the master computer to the slave computer in a tried and/or tested state.
- the aforementioned first layer is preferably designed as a cluster service. It can also be a basic component (one or more basic components are referenced and configured in a user service—see next layer—in order to configure the user-specific part and realise the IAM use cases. They represent the basis or foundation for higher-value components.).
- a “cluster service” is operated by at least two layers (so-called service layers).
- a cluster service can be user-specific.
- the cluster service is preferably, but not exclusively, represented as a centralised “logging system”.
- the cluster service can also be an automated monitoring system or a so-called “tagger”.
- At least one so-called basic component can be referenced and configured with the second layer (designated: user service).
- the user-specific part of the respective units of the functionalities is configured.
- an identity and access management use case is realised.
- Second Layer Designated: User Service
- the layer of the layer architecture “user service” is the centre of the identity and access management system from the respective user's perspective.
- the term “user configuration” includes a complete user-specific configuration according to the needs and/or requirements of the user.
- the basic configuration can be supplemented by further data and/or information of the user and, in particular, can also be overwritten.
- Supplementing and/or overwriting the basic configuration enables further realisation of the user's individual requirements.
- codes or parts of codes of the configuration of the basic components can also be overwritten or supplemented.
- installation abstraction deployment abstraction
- deployment abstraction the invention understands that the part of the configuration that relates to an environment must be abstracted.
- An environment-specific part of the configuration differs depending on the progress of the installation.
- the URL under which the identity and access management system can be reached will have to be configured differently depending on the system.
- An abstraction of the configuration part preferably includes passwords of individual systems or versions.
- the so-called user component is a logical component.
- the logical component may comprise at least two so-called “subsystems and/or subcomponents”.
- the subsystems and/or subcomponents constitute a complex overall system.
- the combination of the user service layer into a user component enables a subdivision of the identity and access management system into different versions.
- the overall system can be transferred to other environments (stages).
- the overall system can also be made available in a single stage.
- the third layer (referred to as the user stage) is run through for each phase of the identity and access management system that the user requires.
- the first layer (component) and the second layer (user service) essentially concern at least one software programme product (software artefacts).
- the third layer “user stage” preferably, but not exclusively, comprises hardware components.
- Hardware components are preferably, but not exclusively, the computing device and/or the memory device and/or the at least one working component of the respective computer.
- the third layer (designated: user stage) preferably units of the functionality of the computing device and/or the memory device and/or the further working component of the master computer are transmitted from the master computer to the slave computer.
- the transmission takes place in coded form.
- the third layer (designated: user stage) leads to an executable and usable identity and access management system at the slave computer.
- the invention understands the term “infrastructure configuration” to mean the case of a system in which at least one runtime environment (Kubernetes) is provided.
- the runtime environment is configured by means of a code. This is a so-called “infrastructure-as-code” approach.
- the infrastructure configuration includes the configuration of at least two accesses to at least two infrastructure components.
- the type of resources used and the limits set for automatic, elastic scaling relative to runtime are configured according to the needs and/or requirements of the user.
- workflow nodes Preferably, but not exclusively, it is determined how many so-called “worker nodes” can be added, at high load, in clusters and dynamically, preferably in a cloud environment.
- cluster services configuration to mean a reference of the cluster services to be used to one another.
- an automated monitoring is activated. Due to the specific configuration of the stages, an alarm, preferably of a support staff, is only triggered in the productively used stage, but not, for example, in stages used for testing.
- the data and/or information is configured, which was preferably configured in a sub-layer “deployment abstraction”.
- resource limits of individual components can preferably be overwritten.
- each component has an interface to the respective external environment.
- the first layer (designated: component) comprises a sub-layer “integration logic”.
- the integration logic sub-layer of the first layer it is defined how the first layer is monitored. It is further defined in which cases alarms are to be sent out.
- a cluster service “Active Monitor Watcher” is provided, which monitors an installation in a cluster.
- the configuration is dynamically evaluated.
- the dynamically evaluated configuration is registered with an external monitoring service via an API.
- the component installed in this way is automatically monitored.
- alarm messages are sent directly to the support staff in case of specific problems.
- the cluster service “Active Monitor Watcher” proves to be extremely advantageous, as availabilities and non-availabilities of exposed endpoints can be monitored automatically.
- the cluster service is supplemented by a so-called “health service”.
- the so-called “health service” allows to describe test cases for the overall system in a preferably descriptive and/or human-readable language. This can be, for example, but not exclusively, the language Gherkin.
- test cases for the entire system go beyond a mere availability check.
- the “health service” makes it possible for the user to specify so-called performance target values for component response times.
- tests can be carried out with recourse to a human-readable language, with which the service level agreements can be validated.
- the validation can be carried out together with the user.
- the validation can also be checked automatically.
- the health service can have test cases monitored automatically.
- alarm signals can be sent to available support staff.
- reporting values can be reported back by the support staff.
- the invention provides that, within the framework of the identity and access management system, data and/or information are divided into at least two areas.
- a first profile is preferably readable by the user in plain text. However, the readability does not include passwords and stored knowledge.
- a global profile is provided.
- the global profile comprises at least two attributes of the local profile.
- the attributes of the local profile can be formed in the global profile in a non-recoverable and/or a non-readable form. This is a so-called hash.
- the global profile preferably, but not exclusively, comprises so-called one-to-one identifiers.
- a so-called hash of a login name must be entered.
- the hash of the login name refers in particular to a value that the user enters when logging in. This can be, in particular, the e-mail address or the mobile phone number of the user.
- the local profile can be supplemented with further, especially user-specific, attributes.
- users in other regions can also connect to the system of the respective region without having to transfer and save the complete profile.
- the user's digital services can thus be used without compromise, for example, when travelling.
- topology configurator can preferably be integrated in a sub-layer of the “component” layer.
- the sub-layer is designed as “integration logic”.
- Such a topology configurator is preferably executed at the start of a so-called pod.
- a target/performance comparison is carried out with the help of the topology configurator.
- the topology configurator performs further steps to enable the so-called pod to preferably delete existing data and/or make backups from other systems.
- a pod can react dynamically to the existing situation of the runtime environment and other pods belonging to the same LDAP cluster. It can independently determine whether it is needed in the role of master or slave and, depending on this, dynamically configure itself.
- the pod can also include other functions.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (25)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE202019106136.7 | 2019-11-05 | ||
| DE202019106136.7U DE202019106136U1 (en) | 2019-11-05 | 2019-11-05 | System for executing an identity and access management |
| DE102019129762.1A DE102019129762B3 (en) | 2019-11-05 | 2019-11-05 | Process and system for the implementation of an identity and access management system |
| DE102019129762.1 | 2019-11-05 | ||
| PCT/DE2020/100870 WO2021089083A1 (en) | 2019-11-05 | 2020-10-06 | Method and system for running an identity and access management system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20220394030A1 US20220394030A1 (en) | 2022-12-08 |
| US12255894B2 true US12255894B2 (en) | 2025-03-18 |
Family
ID=72801301
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/774,523 Active 2041-06-12 US12255894B2 (en) | 2019-11-05 | 2020-10-06 | Method and system for running an identity and access management system |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US12255894B2 (en) |
| EP (1) | EP3819798A1 (en) |
| WO (1) | WO2021089083A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230185584A1 (en) * | 2021-12-13 | 2023-06-15 | Yext, Inc. | Custom publisher system integration |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001033416A1 (en) | 1999-11-03 | 2001-05-10 | Kidata Ag | Computer system and method for creating personalised data outputs |
| US20050044423A1 (en) | 1999-11-12 | 2005-02-24 | Mellmer Joseph Andrew | Managing digital identity information |
| US20100241756A1 (en) * | 2007-12-06 | 2010-09-23 | Electronics And Telecommunication Research Institute | Method of authentication control of access network in handover of mobile node, and system thereof |
| US20130238751A1 (en) * | 2012-03-10 | 2013-09-12 | Headwater Partners Il LLC | Content distribution based on a value metric |
| DE102013102487A1 (en) | 2013-03-12 | 2014-09-18 | Deutsche Telekom Ag | Method and device for controlling access to digital content |
| WO2015044374A1 (en) | 2013-09-27 | 2015-04-02 | Petri Rudolf Markus | Method and device for the automated production and provision of at least one software application |
| US10586025B2 (en) * | 2017-09-07 | 2020-03-10 | Salesforce.Com, Inc. | Managing the display of hidden proprietary software code to authorized licensed users |
| US11108831B2 (en) * | 2019-01-04 | 2021-08-31 | Vmware, Inc. | Machine policy configuration for managed devices |
-
2020
- 2020-10-06 US US17/774,523 patent/US12255894B2/en active Active
- 2020-10-06 WO PCT/DE2020/100870 patent/WO2021089083A1/en not_active Ceased
- 2020-10-06 EP EP20200422.2A patent/EP3819798A1/en not_active Withdrawn
Patent Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001033416A1 (en) | 1999-11-03 | 2001-05-10 | Kidata Ag | Computer system and method for creating personalised data outputs |
| DE10055684A1 (en) * | 1999-11-03 | 2001-05-23 | Kidata Ag | Computer system for creating personalized data outputs composes derived information individually for user by interpreting instructions based on control language |
| US20050044423A1 (en) | 1999-11-12 | 2005-02-24 | Mellmer Joseph Andrew | Managing digital identity information |
| US20100241756A1 (en) * | 2007-12-06 | 2010-09-23 | Electronics And Telecommunication Research Institute | Method of authentication control of access network in handover of mobile node, and system thereof |
| US20130238751A1 (en) * | 2012-03-10 | 2013-09-12 | Headwater Partners Il LLC | Content distribution based on a value metric |
| DE102013102487A1 (en) | 2013-03-12 | 2014-09-18 | Deutsche Telekom Ag | Method and device for controlling access to digital content |
| US20160028717A1 (en) | 2013-03-12 | 2016-01-28 | Deutsche Telekom Ag | Method and device for controlling the access to digital content |
| WO2015044374A1 (en) | 2013-09-27 | 2015-04-02 | Petri Rudolf Markus | Method and device for the automated production and provision of at least one software application |
| US20160239272A1 (en) | 2013-09-27 | 2016-08-18 | Rudolf Markus PETRI | Method and device for the automated production and provision of at least one software application |
| US10296305B2 (en) * | 2013-09-27 | 2019-05-21 | Rudolf Markus PETRI | Method and device for the automated production and provision of at least one software application |
| US10586025B2 (en) * | 2017-09-07 | 2020-03-10 | Salesforce.Com, Inc. | Managing the display of hidden proprietary software code to authorized licensed users |
| US11108831B2 (en) * | 2019-01-04 | 2021-08-31 | Vmware, Inc. | Machine policy configuration for managed devices |
Non-Patent Citations (3)
| Title |
|---|
| Computer System For Creating Personalized Data Outputs Composes Derived Information Individually For User By Interpreting Instructions Based On Control Language (Year: 2001). * |
| European Telecommunications Standards Institute (ETSI), "SmartM2M; Landscape for Open Source and Standards for Cloud Native Software Applicable for a Virtualized IoT Service Layer", ETSI Draft Specification, Mar. 2018, pp. 1-62, Retrieved from the Internet: docbox.etsi.org/SmartM2M/SmartM2M/70-Draft/00103528/SmartM2M-103528v020.docx [retrieved on Mar. 9, 2018]. |
| Mielke Marc, "Computer System For Creating Personalized Data Outputs Composes Derived Information Individually For User By Interpreting Instructions Based On Control Language" translation of DE 10055684 A1 (Year: 2001). * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20220394030A1 (en) | 2022-12-08 |
| EP3819798A1 (en) | 2021-05-12 |
| WO2021089083A1 (en) | 2021-05-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3724755B1 (en) | Artifact lifecycle management on a cloud computing system | |
| CN112486547B (en) | Application program updating method and device under multi-tenant scene and electronic equipment | |
| US10162650B2 (en) | Maintaining deployment pipelines for a production computing service using live pipeline templates | |
| US8793348B2 (en) | Process for installing software application and platform operating system | |
| US20090217163A1 (en) | System and Method for Deploying and Maintaining Software Applications | |
| US10891357B2 (en) | Managing the display of hidden proprietary software code to authorized licensed users | |
| US8250185B2 (en) | Semantic matching of federation intents and services capabilities in a planning system for automatic service federation | |
| CN112506579B (en) | Multi-service multi-environment management method and system | |
| US20200233699A1 (en) | Platform-based change management | |
| US20210360038A1 (en) | Machine policy configuration for managed devices | |
| WO2022126372A1 (en) | Multi-service multi-environment management method and system | |
| US12255894B2 (en) | Method and system for running an identity and access management system | |
| CN110637294A (en) | Data Distributed Integrated Management System | |
| Dantas et al. | A model-based systems engineering plugin for cloud security architecture design | |
| CN108776618A (en) | Distributed workflow management method and device | |
| Buchanan et al. | Azure Arc-Enabled Kubernetes: Getting Started | |
| DE102019129762B3 (en) | Process and system for the implementation of an identity and access management system | |
| CN118981762B (en) | A container control method, apparatus, equipment and medium | |
| Goyal et al. | Unified Multi-Channel AI Orchestration Platform Architecture | |
| Carruthers et al. | Security Monitoring | |
| Ifrah | Azure Web App for Containers | |
| Kumar et al. | Installation and Setup | |
| Bchelly | How to Compare DevOps, DevSecOps, and Scrum Using Enterprise Architecture Modeling | |
| EP4635159A1 (en) | Generating service-to-service dependency map from dns and fleet management system logs | |
| De Tender et al. | Introduction to Governance in the Cloud |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| AS | Assignment |
Owner name: SERVICE LAYERS GMBH, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BIERMANN, JUERGEN;DECKERS, DANIEL;HOBBS, TIMOTHY CLAYTON;AND OTHERS;SIGNING DATES FROM 20221103 TO 20221128;REEL/FRAME:065572/0332 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: EX PARTE QUAYLE ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO EX PARTE QUAYLE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |